Auditing the Automated Serials Control System
نویسندگان
چکیده
منابع مشابه
Towards Automated Auditing for Network Configuration Changes
IP network operators face the challenge of making and managing low-level device configuration changes to accommodate the rapidly evolving needs of IP networks. As a first step towards automating this task, we explore a data-driven approach to audit high-level change activity in IP networks, by reverse engineering low-level longitudinal configuration data. We demonstrate the utility of our appro...
متن کاملFeasibility of Automated Information Security Compliance Auditing
According to AS/NZS ISO/IEC 27001:2006 [11], management of an organization should provide evidence of its commitment to the establishment, implementation, operation, monitoring, review, maintenance and improvement of the organization’s information security management system. The objective of this research project was to explore the feasibility of designing an intelligent documentation system to...
متن کاملiran auditing organization: information and control source for the auditing profession
this paper examines the usefulness of the auditing organization for the auditing profession from the point of view of the scientific board members of accounting groups of public universities, master of science courses and ph.d. students of accounting at public universities, financial managers of active companies in the tehran stock exchange and the mangers of private auditing institutes. the re...
متن کاملControl System 64 . Control System for Automated Feed Plant
Many factories, especially in developing countries, still use old technology and control systems. Some of them are forced to replace at least the control and supervising system in order to increase their productivity. This chapter presents a modern solution for updating the control system of a fodder-producing factory without replacing the field devices or the infrastructure. The automation sys...
متن کاملAuditing Cryptography: Assessing System Security
Steve Stanek 78.1 Assessing Risk ..................................................................... 1023 78.2 Encryption’s Number-One Problem: Keeping Keys Secret........................................................................... 1024 78.3 Encryption’s Number-One Rule........................................ 1024 78.4 Remember to Encrypt E-Mail ...........................................
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Serials Librarian
سال: 1993
ISSN: 0361-526X,1541-1095
DOI: 10.1300/j123v23n03_41